AI Engineering
Designing retrieval pipelines, agent systems, and LLM applications, with the evaluation harnesses and guardrails required to run them in production.
I work at the intersection of AI and cybersecurity. On one side, I design retrieval systems, agent pipelines, and the evaluation harnesses that keep them honest. On the other, I evaluate security controls and IT risk, and document the evidence behind both. I build things that hold up in production.
Tools & frameworks I work with
Services
Four capabilities I bring to AI and IT-risk programs.
Designing retrieval pipelines, agent systems, and LLM applications, with the evaluation harnesses and guardrails required to run them in production.
Evaluating and testing IT general controls, design effectiveness, operating effectiveness, and the evidence each one produces for audit.
Aligning security programs with policy, regulatory requirements, and the risk appetite the business actually operates by.
Applying data analysis to surface anomalies, strengthen metrics, and give leadership a clearer picture of what is and is not working.
Credentials
Industry credentials across security, governance, and delivery.
Focus
Writing
Short essays on AI, security, and IT risk.
A six-minute tour of why random forests work, decision trees, the two tricks that tame them, and the place where they quietly stop being the right tool.
MLOps is what the job actually is: data, training, serving, and the monitoring loop that catches the silent failures before your users do.
Three eras of software in one diagram. What changes when the system has to reason, and what breaks if you treat it like it doesn't.